News 2016
2016 Wilkes Stipendium award
The fourth awarding of the Wilkes stipendium, a prize given to a female
computer science/engineering or IT student that has a distinguishing record,
has taken place with Sabina Serra as the award winner. Sabina studies Computer
Science and Engineering. The 2016 prize was awarded in the IDA Autumn lunch
meeting.
Read more
Remembering to do things
All people in their daily lives need to remember to do things. This ability is
within cognitive psychology called prospective memory, that is, the ability to
remember intentions at the right occasion. Previous research has shown that
older adults perform worse than younger adults on tests that measure
prospective memory in laboratory-based experiments. However, previous research
has also shown that the opposite is sometimes true when measuring the same
ability in everyday situations.
In his dissertation Mattias Forsblad presents a cognitive ethnography conducted
across a number of older people on everyday practices for shaping and using the
environment where he demonstrates the ways in which these practices usually
helps, but sometimes also hinder, the ability to remember intentions. The
thesis shows by means of the theoretical perspective distributed cognition how
systemic properties of the home and nearby environments shape information flow
and consequently what is demanded of individuals. The participants and the home
environments exhibit many similarities, but also some differences, with what
previous studies have observed in professional environments. Prospective memory
is not only an ability in people; it is also an interaction between people and
the characteristics of their home and nearby environments.
Read more
Wilkes stipendium winners travel blog
You can now follow Hanna Sterneling's visit to the Grace Hopper Conference 2016
in Texas, together with Inger Erlander Klein, in the travel blog of IDA top
girls. Hanna got awarded with the Wilkes stipendium in 2015 to attend this
conference.
Read more
Simple and secure web authentication
Users of web services have many accounts to keep track of. To access their
personal accounts, users need to be authenticated, which means that they prove
their identity. Usually this is done be providing their username and password.
There are several security problems related to the use of passwords, but the
alternatives are normally not adapted for mobile users who need to access their
accounts everywhere, in untrusted environments, such as on an untrusted
network.
A popular alternative to authenticating to every single website is to use
third-party authentication, allowing the user to use a third-party site to
access other websites and therefore have fewer passwords to remember.
In her PhD thesis, Anna Vapen has created a method for comparing, evaluating
and designing authentication solutions for mobile users in untrusted
environments. She has also studied the usage of third-party authentication in
different regions and for different types of services.
In third-party authentication information is often shared between the
third-party website and the website the user wants to access. In the thesis, it
is shown how such information sharing can lead to risks related to security and
user privacy.
Read more
Award for teaching achievements 2016
Aseel Berglund, Senior Lecturer at IDA, got the 2016 award from the Institute of Technology for her teaching achievements and excellence efforts in the course Professionalism for Engineers that is given to students on the first three years (Bachelor level) of the 5 year degrees in Computer Engineering and Software Engineering. Aseel has developed the course and is also the course leader and examiner since the start in autumn 2013.
Best thesis award for 2015
The best thesis prize for Bachelor and Master theses presented during 2015 was
awarded for the 17th time with a sponsorship of the Swedish Computer Society.
This year’s Promotor, Inger Erlander Klein, named Alexander Alesand for the
master level prize, and Viktor and Mathias Almquist for the Bachelor level
prize. She also praised all the nominated students for well-deserved
nominations.
Read more
Assessing shared strategic understanding
In the event of a crisis or during military operations decision makers work
together as a team to command and plan activities. A team has a common goal,
where members have different roles and functions, and where the members are
interdependent of each other to reach the common goal. It is assumed that a
team with a shared understanding of the common goals are better at doing its
job. In his PhD "Assessing shared strategic understanding" Peter Berggren
developed an instrument to measure the shared understanding of the team. The
instrument is called "Shared priorities".
Previously developed techniques to measure related concepts such as shared
mental models and shared situation awareness are associated with some
complications: they require domain expertise, they are designed for a specific
situation, the analysis of the data are often complicated, they are time
consuming, and in some cases they are based on subjective perceptions.
The instrument Shared priorities involves that the team members individually
generate factors that are important for the team to achieve the common goal.
All team members then rank the factors independently. A measure of concordance
in the team is calculated. The measure has been shown to correlate with the
team's performance and can distinguish teams that are more trained from teams
who are less trained.
Read more
Recent advancements within chain graphs
Probabilistic graphical models are currently one of the most commonly used
architectures for modelling and reasoning with uncertainty. They are used in a
wide range applications ranging from error diagnostics in printers to modelling
protein structures in bioinformatics and decision support systems in market
analysis.
The most commonly used subclass of the models, Bayesian networks, do however
have a major limitation, which is that only asymmetric relationships, namely
cause and effect relationships, can be modelled between the variables. A class
of probabilistic graphical models that tries to address this shortcoming is
chain graphs, which include two types of edges in the models representing both
symmetric and asymmetric relationships between the variables.
In his thesis, Dag Sonntag discusses the semantics of chain graphs and present
recent advancements made in the research field. He also compares the
expressivity of the subclass as well as proposes new structure learning
algorithms to learn chain graph models from data.
Read more
Are your mobile apps consuming too much energy when accessing the network?
Energy consumption and its management have been clearly identified as a
challenge in computing and communication system design, where energy economy is
obviously of paramount importance for battery powered devices.
Ekhiotz Jon Vergara's PhD thesis addresses the energy efficiency of mobile
communication at the user end in the context of cellular networks.
The first contribution is EnergyBox, a parametrised tool that enables accurate
and repeatable energy quantification at the user end using real data traffic
traces as input. EnergyBox models the energy consumption characteristics of
wireless interfaces and allows to estimate the energy consumption for different
operator settings and device characteristics. EnergyBox facilitates energy
consumption studies, and the thesis proposes different energy-efficient
solutions from application and operating system perspective. Spotify has used
EnergyBox to reduce the energy consumption of their Android application.
The thesis also studies the generic problem of determining the contribution of
an entity (e.g., application) to the total energy consumption of a given system
(e.g., mobile device). It compares the state-of-the-art policies in terms of
fairness leveraging cooperative game theory and analyse their required
information and computational complexity. The thesis shows that providing
incentives to reduce the total energy consumption of the system (as part of
fairness) is tightly coupled to the policy selection and provides guidelines
to select an appropriate policy depending on the characteristics of the system.
Read more
Innovation grant from Google
Journalism++ Stockholm together with IDA PhD student Måns Magnusson gets an
innovation grant from Google News Initiative to develop Marple, a highly
automated news service for finding especially local stories in public data.
Read more
Prof. Erik Sandewall will be given the IJCAI 2016 Distinguished Service Award
The IJCAI Distinguished Service Award was established in 1979 by the IJCAI
Trustees to honor senior scientists in AI for contributions and service to the
field during their careers. Previous recipients have been Bernard Meltzer
(1979), Arthur Samuel (1983), Donald Walker (1989), Woodrow Bledsoe (1991),
Daniel G. Bobrow (1993), Wolfgang Bibel (1999), Barbara Grosz (2001), Alan
Bundy (2003), Raj Reddy (2005), Ronald J. Brachman (2007), Luigia Carlucci
Aiello (2009), Raymond C. Perrault (2011), Wolfgang Wahlster (2013) and Anthony
G. Cohn (2015).
At the 25th International Joint Conference on Artificial Intelligence,
IJCAI-16, the Donald E. Walker Distinguished Service Award will be given to
Erik Sandewall, Professor of Computer Science (retired) at the Department of
Computer and Information Science at Linköping University. Professor Sandewall
is recognized for his substantial contributions, as well as his extensive
service to the field of Artificial Intelligence throughout his career. He is
one of the founders of IJCAI and he served as the Editor-in-Chief of the
Artificial Intelligence Journal for many years and made significant
contributions to the success of the journal and to the wider dissemination of
AI into the scientific community.
Read more
Analysis, Design, and Optimization of Embedded Control Systems

Today, many embedded or cyber-physical systems, e.g. in the automotive domain,
comprise several control applications, sharing the same platform. It is well
known that such resource sharing leads to complex temporal behaviors that
degrades the quality of control, and more importantly, may even jeopardize
stability in the worst case, if not properly taken into account.
In his thesis, Amir Aminifar considers embedded control or cyber-physical
systems, where several control applications share the same processing unit. The
focus is on the control-scheduling co-design problem, where the controller and
scheduling parameters are jointly optimized. The fundamental difference between
control applications and traditional embedded applications motivates the need
for novel methodologies for the design and optimization of embedded control
systems.
Read more
New technique for tropical cyclone forecasting
Chandan Roy's PhD thesis proposes a technique based on artificial neural
networks and open satellite data to get earlier and more accurate forecasts for
cyclone warning systems, especially in countries with less economic and
technical means like Bangladesh.
Read more
Design of Secure Real-Time Embedded Systems
Real-time embedded systems have several design time constraints such as timing,
resource efficieny and performance. Security has not been an important design
concern earlier, and has been overlooked in the past. Ke Jiang's PhD thesis at
IDA approaches the design of secure embedded systems with a focus on
communication confidentiality and side-channel attack resistance.
Several techniques are presented in this thesis for designing secure real-time
embedded systems, including hardware/software co-design techniques for
communication confidentiality on distributed platforms, a global framework for
secure multi-mode real-time systems, and a scheduling policy for thwarting
differential power analysis attacks.
All the proposed solutions have been extensively evaluated experimentally,
including two real-life case studies, which demonstrate the efficiency of the
presented techniques.
Read more
New algebraic methods to study the complexity of constraint satisfaction problems
Constraint satisfaction problems are an important type of computational
problems with many applications within for example scheduling and optimisation
problems. The so-called algebraic approach has for the past 20 years had
tremendous success in identifying constraint satisfaction problems solvable in
polynomial time. Since efficient algorithms exists for such problems, they are
often said to be tractable. However, this algebraic approach cannot be used to
study the worst-case time complexity for the problems that are not believed to
be tractable, even though these problems can vary substantially in complexity.
To study the difference in complexity between hard constraint satisfaction
problems of this kind, Victor Lagerkvist in his PhD thesis on IDA proposes an
algebraic framework based on partial functions. This framework is then used to
study the complexity for many well-known variants of the constraint
satisfaction problem. The complexity for these problems is then related to a
complexity theoretical conjecture, the exponential-time hypothesis, which
states that there is a sharp limit to how much it is possible to improve
exponential-time algorithms for constraint satisfaction problems.
Read more
Page responsible: Webmaster